Sawada et al., 2015 - Google Patents
A fallback control study of networked control systems for cybersecuritySawada et al., 2015
- Document ID
- 15539419501954315510
- Author
- Sawada K
- Sasaki T
- Shin S
- Hosokawa S
- Publication year
- Publication venue
- 2015 10th Asian Control Conference (ASCC)
External Links
Snippet
Recent control systems of critical infrastructures are networked systems, which are exposed to the infection of the computer malwares. This paper considers a cybersecurity technology of networked control systems in terms of availability. Architecture of fallback control is …
- 238000004891 communication 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zografopoulos et al. | Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies | |
Tuyen et al. | A comprehensive review of cybersecurity in inverter-based smart power system amid the boom of renewable energy | |
Venkataramanan et al. | Measuring and enhancing microgrid resiliency against cyber threats | |
Liu et al. | Enhancing cyber-resiliency of der-based smart grid: A survey | |
Ding et al. | A survey on security control and attack detection for industrial cyber-physical systems | |
Wang et al. | Distributed framework for detecting PMU data manipulation attacks with deep autoencoders | |
Lin et al. | Runtime semantic security analysis to detect and mitigate control-related attacks in power grids | |
Adhikari et al. | Applying hoeffding adaptive trees for real-time cyber-power event and intrusion classification | |
Lou et al. | Assessing and mitigating impact of time delay attack: Case studies for power grid controls | |
Kundur et al. | Towards modelling the impact of cyber attacks on a smart grid | |
Parthasarathy et al. | Bloom filter based intrusion detection for smart grid SCADA | |
Mousavian et al. | Real-time data reassurance in electrical power systems based on artificial neural networks | |
Anwar et al. | Ensuring data integrity of OPF module and energy database by detecting changes in power flow patterns in smart grids | |
Tadepalli et al. | Distributed control microgrids: Cyber-attack models, impacts and remedial strategies | |
Ni et al. | Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks | |
Sawada et al. | A fallback control study of networked control systems for cybersecurity | |
Lydia et al. | Securing the cyber-physical system: A review | |
Patel et al. | Event‐triggered detection of cyberattacks on load frequency control | |
He et al. | Cascading failure in cyber–physical systems: A review on failure modeling and vulnerability analysis | |
Sadi et al. | Time sequence machine learning-based data intrusion detection for smart voltage source converter-enabled power grid | |
Madabhushi et al. | A survey of anomaly detection methods for power grids | |
Hossain-McKenzie et al. | Harmonized automatic relay mitigation of nefarious intentional events (harmonie)-special protection scheme (sps) | |
Huang et al. | Algorithmic attack synthesis using hybrid dynamics of power grid critical infrastructures | |
Sasaki et al. | Fallback and recovery control system of industrial control system for cybersecurity | |
Sun et al. | A reinforcement learning engine with reduced action and state space for scalable cyber-physical optimal response |